Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Microsoft Office Vulnerabilities Let Attackers Execute malicious Code

Posted on September 10, 2025September 10, 2025 By CWS

Microsoft has launched patches for 2 vital vulnerabilities in Microsoft Workplace that might enable attackers to execute malicious code on affected programs.

The issues, tracked as CVE-2025-54910 and CVE-2025-54906, have been disclosed on September 9, 2025, and have an effect on varied variations of the favored productiveness suite.

Whereas Microsoft has assessed exploitation as “much less probably” for each vulnerabilities right now, their potential for distant code execution warrants rapid consideration from customers and directors.

The vulnerabilities differ of their exploitation strategies and severity, with one being rated as Crucial and the opposite as Necessary.

Crucial Microsoft Workplace Vulnerabilities

The extra extreme of the 2 flaws, CVE-2025-54910, is a Crucial-rated heap-based buffer overflow vulnerability.

One of these weak spot, cataloged as CWE-122, can enable an unauthorized attacker to execute arbitrary code regionally on a goal machine. A very harmful side of this vulnerability is that the Preview Pane in Microsoft Workplace serves as an assault vector.

Which means an attacker might doubtlessly set off the exploit with none interplay from the person past them merely receiving and viewing a malicious file in an Explorer window.

Though the assault is executed regionally, the time period “distant” within the vulnerability’s title refers back to the attacker’s location, highlighting that they don’t want prior entry to the sufferer’s machine.

The second vulnerability, CVE-2025-54906, is rated as Necessary and stems from a Use-After-Free situation, tracked as CWE-416.

This flaw additionally permits distant code execution, however its exploitation vector differs considerably from the heap-based overflow. To take advantage of this vulnerability, an attacker should craft a malicious file and socially engineer the person into opening it.

In contrast to the opposite flaw, the Preview Pane is just not an assault vector for CVE-2025-54906, that means the person should actively have interaction with the malicious content material.

This requirement for person interplay is a key cause for its decrease severity score in comparison with the Preview Pane vulnerability.

Mitigations

Microsoft has launched safety updates to handle these vulnerabilities for many affected software program. The corporate advises prospects to use all updates supplied for the software program put in on their programs to make sure complete safety.

It ought to be famous that safety updates for Microsoft Workplace LTSC for Mac 2021 and 2024 usually are not instantly obtainable however will probably be launched shortly.

Microsoft will notify prospects via a revision to the CVE info as soon as these updates are prepared. Given the intense nature of distant code execution flaws, customers are strongly inspired to put in the patches as quickly as doable to mitigate the chance of potential exploitation.

Discover this Story Fascinating! Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates.

Cyber Security News Tags:Attackers, Code, Critical, Execute, Malicious, Microsoft, Office, Vulnerabilities

Post navigation

Previous Post: HackerOne Confirms Data Breach – Hackers Gained Unauthorized Access To Salesforce Instance
Next Post: Highly Popular NPM Packages Poisoned in New Supply Chain Attack

Related Posts

Kibana Crowdstrike Connector Vulnerability Exposes Protected Credentials Cyber Security News
Linux Firewall IPFire 2.29 Core Update 195 Released With VPN Protocol Support Cyber Security News
CefSharp Enumeration Tool Reveals Security Vulnerabilities in .NET Desktop Apps Cyber Security News
New HTTP/2 MadeYouReset Vulnerability Enables Large-Scale DDoS Attacks Cyber Security News
Malware Operators Collaborate With Covert North Korean IT Workers to Attack Corporate Organizations Cyber Security News
Multiple GitLab Vulnerabilities Allow Attackers to Achieve Complete Account Takeover Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
  • New AiTM Attack Campaign That Bypasses MFA Targeting Microsoft 365 and Okta Users
  • Gladinet CentreStack Flaw Exploited to Hack Organizations
  • Fieldtex Data Breach Impacts 238,000
  • CyberVolk Hackers Group With New VolkLocker Payloads Attacks both Linux and Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
  • New AiTM Attack Campaign That Bypasses MFA Targeting Microsoft 365 and Okta Users
  • Gladinet CentreStack Flaw Exploited to Hack Organizations
  • Fieldtex Data Breach Impacts 238,000
  • CyberVolk Hackers Group With New VolkLocker Payloads Attacks both Linux and Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark